10 Ways To Help Users Transition To Linux

Linux is free, safe, reliable and free. If you are someone assembling computers, I highly recommend using Linux as an operating system without the fear of the so called ‘hard to install and use’ fear. Here’s an excellent article for you to read on 10 ways to help users transition to Linux.

  • Filed under: Links, Open Source
  • A NSA certifed Secure Mobile Environment Portable Electronic Device, Spectra Edge.


  • Filed under: Technology
  • I usually use two wireless networks, my home and university, to browse Internet.

    In my university I have been assigned a specific IP address and connect to the Internet through a proxy server where as at home I simply let my router assign me settings via DHCP. On a Mac, it is really easy to make a profile for a specific network rather than input the settings manually every time (Windows eh..) we are in a different network. We can make as many network profiles as we need to and assign the network settings in them. So whenever you go to the particular location, just select the profile from the network preference pane. It’s that simple!

    Let’s see how:

    Select the ‘Network’ pane from System Preferences.

    Picture 7

    In the ‘Locations’ drop down menu, select the option ‘Edit Locations’.

    Read the rest of this entry »

    Best Music of 2008 – Picked By NPR Listeners

    A list of 25 songs which were picked to be the best of 2008 by the listeners of National Public Radio. I got 15 of them in my iTunes. Looks like my taste in music isn’t that off-stream, eh…

  • Filed under: Music
  • 25 Most Dangerous Programming Errors

    Sans.org has published a list of top 25 most dangerous programming errors. These errors have been compiled by a team of US and other international anti-cybercrime organizations. Two of these erors lead to more than 1.5 million security breaches during 2008.

    Poor man’s virus

    VARNING: MinnySoda Compewtr Virus

    Ve haf just sent you da NORVEGIAN VIRUS. Since ve do not haf any programming experience and do not know how to actually demage your computir, dis Virus verks on da honor system. Please forward dis Virus to eferyvone on your mailing list and den manually delete all of da files on your hard drive.

    Tank you for your cooperation,

    Sven and Ole

  • Filed under: Funny
  • Introduction to Ruby for Mac OS X

    Introduction to Ruby for Mac OS X The Principle of Least Surprise by Jim Menard

    This course is from The University of New South Wales, Sydney Australia, and is the complete video recording of lectures in progress. It is free to download to everyone everywhere regardless of whether you have an iTunes store account or not. I have gone through 25 out of 46 available lectures till now and I find it really excellent with the tutor keeping the students very interested in the stuff being taught while maintaining a real interactive note throughout. The image below describes the course in full.

    ITunes U 

    Click on the image to view it in full size.

    No Offense!

  • Filed under: Funny
  • How To Keep Your Wi-Fi Network Secure

    As a CCNA I am asked a lot of times by curious friends or relatives about various precautions they can take to keep their Wi-Fi network safe from hackers or unauthenticated users. So today I thought of compiling some simple steps in a post which I usually recommend to keep the wireless network secure. These settings can be configured/changed in admin page of your Wi-Fi router by putting in the IP address of your router in a browser’s URL toolbar.

    Change the default password

    Each router has a default username and password, and you should always change these the moment you start configuring the router. If the router’s password is either unchanged common or weak, a hacker might be able to reconfigure the router and wipe out all your other security measures, making them useless. You should try to use a good mix of numbers and characters to be on the safe side.

    Disable the DHCP service

    DHCP (Dynamic Host Configuration Protocol) enables remote computers connected to the router to obtain an IP address and connect to the network without needing to know the IP and Router address information. Disabling the DHCP services is

    Read the rest of this entry »